Browse Definitions :
Definition

linkbaiting

Contributor(s): Ivy Wigmore

Linkbaiting is the practice of crafting content that is designed to get other content producers to link to it. The purpose is increasing the number of inbound links to your content and thus improving its performance in search engine results.

The most important element of linkbaiting is creating compelling content, something that the reader finds value in. Examples of link bait, in this context, include breaking news, striking images, infographics, controversy, humor, educational material and applications. If your content has value for readers, they are likely to share the link.

Beyond the quality of the content itself, the most common linkbaiting tactics are creating titles that draw readers to the content and developing reciprocal relationships with other content producers, in which you share links to their content and they to yours.

Both linkbaiting tactics can be used either well or poorly. A well-crafted title grabs the reader's attention and accurately represents the content. However, one common misuse of linkbaiting is the creation of catchy -- but misleading -- titles for articles. Similarly, if you share links to high-quality content, you, your readers, and the content creator all benefit. However, if you frequently share links to content that is not intrinsically valuable, your own content will lose value for both readers and search engines.

This was last updated in October 2012

Continue Reading About linkbaiting

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • challenge-response authentication

    In information security, challenge-response authentication is a type of authentication protocol where one entity presents a ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • exbibyte (EiB)

    An exbibyte (EiB) is a unit used to measure data capacity.

  • zebibyte (ZiB)

    A zebibyte (ZiB) is a unit used to measure computing and storage capacity.

  • tiered storage

    Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing ...

Close